General
-
Target
07112023_2240_27c9f60aaba81.zip
-
Size
65KB
-
Sample
231107-r1xlyabf57
-
MD5
88424ee9bb150b071c277b6c3e0ebc66
-
SHA1
4d27d988318c5774642c7f6ac8c5259a85afb797
-
SHA256
9fc091851a420204b53e5a02e7a9d41c653f8d67e0cb792b90b56ce27667cbce
-
SHA512
00ea7e5d4bca424a52883e5df790d19788ff79c62594d98c38e5dc99d1da18596fdb647e558f18caced077efd1647684b46085a98b34d2399de7c50b62ec8e4f
-
SSDEEP
1536:xDJVRmoh2G3oIh6a62eUePP1ZueowjaavwI/C/4m0BHEV5zbu:phJTTSPzuI60C/43Bsxbu
Static task
static1
Behavioral task
behavioral1
Sample
27c9f60aaba81.js
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
27c9f60aaba81.js
Resource
win10v2004-20231020-en
Malware Config
Extracted
darkgate
user_871236672
http://8sjimonstersboonkonline.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
false
-
check_ram
true
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
BXQcSgVDRBHnbn
-
internal_mutex
txtMut
-
minimum_disk
43
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Targets
-
-
Target
27c9f60aaba81.js
-
Size
252KB
-
MD5
5780dea262044531b19f3194408aad91
-
SHA1
a2579952eedec5ec649f589c1e797c91a05eaf93
-
SHA256
eccf555cc4f3293e850fc35377a06d69f04b81192f3f27b645bc4cfb23fc085d
-
SHA512
e45f5351921016ff87e6d81cc1eaade7c88324f847ec37dd60d08bc4830ebe6fb6b00f9623d3438d03c48236f091fff19f239face730ddfa2c9ea6640adc55c3
-
SSDEEP
6144:Ye7hgXeerjqlI2Iro+/e7hgXeerjqlI2Iro+8:YIhgSlI234IhgSlI23V
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-